On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
Scott Isaacs Presentationajaxexperience (Final)Presentation Transcript
Beyond IFrames:Web Sandboxes Scott Isaacs Software Architect Microsoft
Circles of (Dis)Trust Shared Frameworks Affiliates Images Gadgets Maps You Tube Your Code Social Networks Analytics Search Content Display Ads Images
User’s Expectations ≠ Reality Mismatch between browser security and expectations O/S boundaries protected Cross-domain content protected Composite pages have a single policy Aggregation (mash-ups) not protected You need a composite policy for a composite page Let’s secure the cookie…
The growing risk… Differentiation between Cloud and Local Services is blurring… User Data being aggregated… Personal Data (both local and cloud-based) Storage, Photos, E-Mail, Social Network/ Contacts, IM Devices Phones, GPS, Camera, etc. …and exposed to… Site Services Rich Advertising, Analytics, Maps, Affiliate Programs Site Extensibility Gadgets, Libraries, etc.
What about IFrames? Still exploitable… Run-away code… Navigation… Click-Jacking… And not rich enough… Designed for content embedding Established fixed “policies” Won’t work for display integration (e.g., fly outs) Fails for tight integration w/ API’s, CSS Isolation model, not a Security Architecture
Web Sandbox Isolate and secure the boundaries via composite host-defined policies Builds on existing knowledge Embrace existing programming patterns Provides browser equalization Open Source Project (Apache License)
Your Web Page Creating Secure Containers Policy and Rules Policy and Rules Policy and Rules Web Sandbox Virtual Machine Web Sandbox Virtual Machine Web Sandbox Virtual Machine Untrusted Script Untrusted Script Untrusted Script
Sandbox Virtual Machine Validates execution against policies Supports instancing and lifecycle Monitors QoS via profiling & throttling Protects external communication
Trusted/ Untrusted boundaries Custom Policies to Surface Host APIs Demo… Mutually distrusted components sharing single “Trusted” Map
Closing Thoughts… Web Application ecosystem is evolving Applications getting richer via aggregation More valuable services and personal data are exposed The web security model must evolve Web-sandbox adds protection across the boundaries Sites can properly model and enforce the trust relationship Sites can protect themselves and their users Possible without redefining the web… Go play with it (http://websandbox.livelabs.com)
Questions? Learn more at: http://websandbox.livelabs.com Also don’t miss the panelSecure Mashups: Getting to Safe Web Plug-insWednesday, 10:55am